Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 16:38
Static task
static1
Behavioral task
behavioral1
Sample
0fa7ffb70cefb9ae455c960792b1a69f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0fa7ffb70cefb9ae455c960792b1a69f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0fa7ffb70cefb9ae455c960792b1a69f_JaffaCakes118.html
-
Size
138KB
-
MD5
0fa7ffb70cefb9ae455c960792b1a69f
-
SHA1
d51c173d14e9b7ccc78307c4a1266553eb926e1e
-
SHA256
1f67faa752f23755c4606765457cf20a739c3c2ed03dc7f9121593e5def98cdd
-
SHA512
01183e520af34154b047bbc30c4ab65f767b958b3cc4a23c1f243fca2fdaf67de2242efcd068f953126a9ff286e0b861602e9d49b4837974d86230598579f847
-
SSDEEP
1536:SIRq/rl6oNyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SIoxNyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EAEE85B1-81A5-11EF-9EA5-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80b2de02b315db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000098dfcecf27270f7fd4b09defb81e87ad7ed4226100e0bcb25ad441eacce63876000000000e8000000002000020000000f863f95dd6a7f66be9e736cdf217ff020136449a4b8eae0dabcd04e8091cfdba20000000b8c5c7b2a858f3c30de4e39a74766db17b83f56396082b206ae58243ef28e0714000000077fae0413d76a3c4487683697551880742c39f8223015eeb039a80f02232bdc9fcc292f5ca01dcd078492b68bbe4fe414155688920492e0e24bd03dc14da69ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434135376" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2332 2364 iexplore.exe 30 PID 2364 wrote to memory of 2332 2364 iexplore.exe 30 PID 2364 wrote to memory of 2332 2364 iexplore.exe 30 PID 2364 wrote to memory of 2332 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0fa7ffb70cefb9ae455c960792b1a69f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5396d2027b1b20e6ce5b67c4fef76c838
SHA1b445ad33886e06d1a26277438bd195203c4c4a6b
SHA2562bd95f1c1d14ad1df86407eb97d1148b794fc97150b5ab2b72bd3f7bdef25214
SHA51278c1acc8226ffe7514d3c0a41166f2048b0cba669904e3344e3a3127bb7ec5330883ad27405fa12d99f338132d960110cbd0655637db8bdc592129d5af1940d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511bc7d4162fd0e1a53c260c2f242b040
SHA1c4933430c0324bdd4075b74e600b76004ed5179f
SHA25605e12b26dd95dba40c76a959a30b9df9cfe57168d17fce7974ff6b7a9a85b279
SHA5125006229ede249a12283a7522457509aefce515f66d0f1d11510a60f02e17c5cfa2b65cd6d9f375a5f4308af96067fe3c048db7b5ac863b3e7e803eb747e1d38f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54296f18ff3949c02e2aec88708c17f76
SHA1708f2a6f6296b89a579c2054364c8bbe6778088d
SHA256c3ba07115ea65082159ad822ba677094dde73fa055e6cec2d598806a73097109
SHA51248f71098bb3488cc85165c99ae27f5a8ccf409cd4f080c249bf80a07becb43a6f0edc311555c5752e723c24711a434bd8b1f5cf6f18117f944f8f5cd53aac84a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d199c6339d588c1ddbf4c45df5297c2
SHA11f79d38f6b170f0d3d263acf942e759010b07273
SHA256367c5194e79fd2c903584d2ff28146c99c0a58d92e1789a4385b85146020ef9d
SHA512c57f5584e3b846c08fb1edfa438c24c86e305709783025fcb01d5b96f306aedea1e302cde2d1ca92e2c27cb9ea24eabd934b399456e835e1cb1115e235c11ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d92fd30a46a5f38e53738d1779dc65b
SHA1b83a78890f86d00028acca0ba713d1d93f908272
SHA256101be7b2eb57a8b984477cb0bf61e6e45c8c6b5aa9fb18442ffc2fce58c29f65
SHA512ac3fd6da828033acbe8f7c6397e389cebbca36eae4b88cc126185a16dcccd2622f77a1cf926c0e2519feb1bc4e9a57091a5088ab01d64907c5633d453cf0e61c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e8001f40675c2f2622ae875b2d65a1a
SHA169d7afc06092dcdeb7ed58a6986e68cb54120868
SHA256cd6f18f542e996ff28a47115bf66149113c5179c76e6f62f0ce52f72540de202
SHA512242dd25f16e9b8f4fdae0fe5c99295b32ed4836e69bce4ec8dcf3bbaf81fe9d6d3fa3cbee1c2bd1614b50c70cdbc11d4e3fa6f2f9b5569633c7883c68360b387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4be136d900c3fb0561888ef53f51839
SHA1c39ed0f0f2562fa2ec85fa2cb7a49a6827a36e48
SHA256993b0ec508bbe8a804910bdf9af2241b831413b9ddc6e8201783426003055e3c
SHA5129cbde20ee73def473134bba23c6f5c1e9c6a76f500dcef4a50f0a803b83e2e10905019f715b004e43467eb6f347c62ea5a0725dbba92a8f06d0446c0694f93ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512d6353f34eaeefa48f6dd8f2895dfcb
SHA10e60ebec3090e862265863bba6ecda60c0cebbc0
SHA2561d4aa5402ce70bdc7fb16ea202a64f6d3d6e02af2e855f0767744c50b5223352
SHA512f760948fdbab2c55367b38160337f83105ba6cb44851f54efb00b9a4844bc8f190d8c08029068d6ba8ab325e8806dbaa9571d3af20ff7d533d23590c18df972e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ede425ea90289c170a616194fdc7a7
SHA1e2c7a71a1493af170c4df136c85fef46d88e1648
SHA256162ba7283d24313c8872f103db78e3090dab95a44008375c76e11b7880c90ae9
SHA512bd8483b8b4991db6a6d138d1c386adbfd92513f79e871a5382cda9631c2f17d806c51fabe1b18195afd9abe1e5e6a8ccec53fa22e713331485143dcdcee5c3ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e992825c35a1545f29426e94417e472
SHA1835c58682976931572ead4f0328183b3511206ab
SHA25642116297014ac5ad79cbfe0ef9029bb12a395958301c23cfbb74935b6ebfed8f
SHA5123e84b7448e4ca639be0cd9a59f73bf5adb96008adfbe6f6ab6f8b415c36f098a727272ffdd9bb63154a4641f2a9566419d042103045206d45e8b90ae142ecab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b29678aae5aecf4a0bb02bad8d9582
SHA1f210aa3195b5e4b231fcd94fab08b147e5ee4f33
SHA256f4c4b58976ecd7ac60fb9dc4fa7d21075118e73a0be8ec6ec2f2995da56544e7
SHA512894382e08a6703360ade698ffcb264afa8d8322865b813c67b31e2d50e574607a418288f6704fba5b65c46d7a3e01f1b5d91d1f7b53b854349e82182e92c1dc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f49f8b572da98f621ae760e4505d6de7
SHA1ee3d8fd8bfded620736810344ef3d524b51b6502
SHA256984a505d1d18cf7b518228fd20eae98d18cd6f996815d41659fdb295abe553fa
SHA512af08b5339c2c207fcbe3d59e3550116739a97e8bf2f728007ba2c3a81ce0be21f10ebd6e2ac675f5bbb046c9451b6355c1edbe048c261ec745a3fa5c64a4dbda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5555a56bc3135606155e12049b323a319
SHA1198b2d12dd03d03d2d56fdcf122e088903763f8b
SHA25642d9f1156d081a5627ec59402ac11569c76426bfd1b6ea03336dc6fa4e846ff3
SHA5127eab9cd04ffda7076c1b009d6ccd1dab3e22a8ed53548c7cf19d34a4cb7e317375cea26ca5382c896c586b146ac8fbec4649de3e382cfedcec62310d5551870c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513745c4156ae02285444a84905f9571a
SHA1d34f8e43da61e592c5f6ff447cbc29e597e87d94
SHA256c06487875f8ed615d2bb5aeaab5cbc143fb93dfa269badf9de30a9aaf9548cdc
SHA5123420cb56c6c3b22f358acdcb037431ae7a1de78e24112baee12c3d2c34c0c2d2af0b6d708e397c160fc9ff09aa278446533c4a525edce6c7ac4b33d6906826ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3cdc3d8d7a9d999aa2f34d6cece0e73
SHA107cd979bf1612cb93af16b48da43093e162e96d9
SHA256bafb66a14afe3fc69a6799f5710c6c6fb2b9328ba979096d0c7330c6dc83158b
SHA512ce2eb8332791e94fd7a96e6a4bef7ca8d3e0c5c597b5a42b6523c4feec6b092c38725f2050434515980e23d199630dd0cf2ec2e1df8fbec4b11da7b4d630a334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5641d67ac8b99da7581526296ea627767
SHA11c618f99a088a4ff9fab36e9361a8f5cdd64151d
SHA25602b7e610c91022a238f075396066099920b75710780424a5992410df56ac3962
SHA51287aa0c8d55798cd3212b4b10b6f754a756ace38f1ab8071bacddf6c1803ec1f619b184976dfe9f97824614eb418f48c8437624c04d07ebf29cae618846318003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54999a56ff4a3e45bdde9c11c2c264e25
SHA103aa0bfc65d2fdcdd2d1e133df0585af33a73802
SHA25648b03a54c841215eff242ca8ddb02c77487ecde0198c89364f097cd34a424b5b
SHA5126aa3e72cb956b051fc10dfdb9fe544f0990b2b70ae3f30b9b99124c893322c2b7bd93c9e672fa71a50e87d822407e9c7f8f21a99bf5df926d14ed6e60d9fc52b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596865abb14cc26c71c3db3502cc41b8c
SHA14f951bed71181674acbae2da17bc4a47c4112d43
SHA2564546a31ceea8c4fd5a0ea3fbb5d0a34fe79de8cf78222c43f72cac9c7c6b9193
SHA512f17458810bde79706e22836a9ff3946194cb811eb4fa98611741b43389695280bdbd8e131fc44690566ba85bec94914d82b7e7556b6cd23b2b191dc46f7836b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554164de982b6b84f5172f5b7e0f82cb0
SHA1e5ddb771d1386d1f377bdf426e3b1e5da6253760
SHA256b810aaf93d8444250a734d1a5cf176b0a6d2c77c84cb2108110537070e2316fe
SHA512111f10fb55b6161763c49a06404d3c7e6ec3fd5ca8938142c9d459c348f35857e9a019e743588b3b65584514f51af4efa57018cac481043e76bfbf4a600d0b83
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b